Deployment Guide

To use the sample file included on the media:
1. Make a copy of the default /etc/iscsi/iscsid.conf file by saving it to another directory of your choice.
2. Edit the following entries in the /etc/iscsi/iscsid.conf file:
a. Edit or verify that the node.startup = manual line is disabled.
b. Edit or verify that the node.startup = automatic line is enabled. This enables automatic
startup of the service at boot time.
c. Verify that the following time-out value is set to 30:
node.session.timeo.replacement_timeout = 30.
d. Save and close the /etc/iscsi/iscsid.conf file.
3. From the console, restart the iSCSI service with the following command: service iscsi start.
4. Verify that the iSCSI service is running during boot using the following command from the console:
chkconfig iscsi on.
5. To display the available iSCSI targets at the specified IP address, use the following command:
iscsiadm –m discovery –t st -p <IP_address_of_iSCSI_port>.
6. After target discovery, use the following command to manually log in: iscsiadm -m node –l.
This login is performed automatically at startup if automatic startup is enabled.
7. Manually log out of the session using the following command: iscsiadm -m node -T
<initiator_username> -p <target_ip> -u
.
Step 4: Configuring Host Access
This step specifies which host servers access virtual disks on the storage array. You should perform this
step before mapping virtual disks to host servers or any time you connect new host servers to the storage
array.
1. Launch MDSM.
2. Navigate to the AMW and click Manually define hosts.
3. At Enter host name, enter the host server for virtual disk mapping.
This can be an informal name, not necessarily a name used to identify the host server to the network.
4. Select a method for adding the host port identifier.
5. Select the host type.
6. Select whether or not the host server will be part of a host server group that shares access to the
same virtual disks as other host servers. Select
Yes only if the host is part of a Microsoft cluster.
7. Click Next.
8. Specify if this host will be part of a host group, and click Finish.
Understanding CHAP Authentication
What is CHAP?
Challenge Handshake Authentication Protocol (CHAP) is an optional iSCSI authentication method where
the storage array (target) authenticates iSCSI initiators on the host server. Two types of CHAP are
supported:
Target CHAP
Mutual CHAP
44